Assessment Overview
An Absio cybersecurity assessment is unique. Not just a network scan or a certification seal of approval, our comprehensive cybersecurity evaluations probe widely and deeply within the organization to identify vulnerabilities that could compromise assets, information, or business continuity. Then we deliver specific recommendations to mitigate the threats.
Assessment Components
Absio uses a combination of security testing tools, staff interviews, policy and documentation reviews, a proprietary self-assessment,[i] and site visit(s) to evaluate the client’s cybersecurity posture. This process serves to:
- Identify and prioritize business assets based on value to the organization.
- Review IT infrastructure architecture, policies, and assets and their impact on the organization.
- Determine threats, such as natural disaster, system failure, human error, unauthorized access, misuse of information, data corruption/loss, data leaks, and service disruption.
- Perform a vulnerability analysis of software and hardware to investigate potential weaknesses open to security breach.
NOTE: Site visits have been suspended due to the Covid-19 pandemic. Facility reviews can be scheduled for a later date.
Findings & Mitigation Plan
An Absio assessment delivers “traffic light” clarity on an organization’s cybersecurity posture, action items, and priority level. Our report includes detailed recommendations and a phased implementation plan, which clients can pursue independently or partner with Absio to execute.